ad-assurance - RE: [AD-Assurance] Friday's call
Subject: Meeting the InCommon Assurance profile criteria using Active Directory
List archive
- From: "Curry, Warren" <>
- To: "" <>
- Subject: RE: [AD-Assurance] Friday's call
- Date: Thu, 18 Apr 2013 13:27:26 +0000
- Accept-language: en-US
- Authentication-results: sfpop-ironport04.merit.edu; dkim=neutral (message not signed) header.i=none
I concur. Going to FICAM etc would be a nearly worst case …
WHC Warren H. Curry UFIT – Identity Access Management PO Box 113359, 2008 NE Waldo Rd 352-273-1383
Have a great day!!! From: [mailto:]
On Behalf Of Ann West I would hope that FICAM would be a very remote option. Negotiations could take months and given our discussion yesterday, affect 800-63 as much as the FICAM program.
This option is extreme in my book and only happens if we have no place to turn. Agree with David that the next step is finishing off our matrix, developing our questions for MS and engaging Dean to confirm our identified gaps and mitigation
strategies, requesting that he take the remaining issues back to MS for discussion. Once we hear back, we can proceed on deciding whether we can assemble a "good enough" set of solutions, maybe with short and long term time frames. Ann From:
Eric Goodman <> I think this is a good re-orienting suggestion. I lean towards proposing #4 directly with FICAM, perhaps in combination with the “monitor and mitigate” approach. I have a hard time believing that FICAM would
blanket refuse AD-based solutions for 800-63/Silver LoA2 certification, as that would be a major blow to adoption.
I’m not at all a fan of lowering security for ease of implementation, but I really have to wonder whether campuses that use AD would ever apply for Silver certification
if AD was ruled out based on what we’ve found. I would think that this would be a fairly drastic step, and/or would need to be done based on positive evidence of AD being a problem. Even if your first strategy (ask Microsoft for a solution) works, it sounds like there’s a very good chance the solution will include “upgrade all of your workstations
to Windows 8”, which would likely go over just as well at the campus level as forbidding AD outright. If we do get the okay on #2 + #4, can InCommon develop (or host) utilities that would assist in doing the required monitoring? I believe the suggestion of “higher entropy passwords” was two-fold: (a) it creates potentially greater challenges to brute force decrypting and (b) older NTLM
style hashes can only be created for 14 character or shorter passwords. Essentially, I think they were partially saying that selecting a 15 character password implicitly disables many of the lower security mechanisms, even if your AD domain policy does not
enforce stronger methods on a global level. --- Eric From:
[]
On Behalf Of David Walker Everyone,
?
Ask Microsoft for a solution. I suspect we won't discover anything we don't already know, but we should ask. Microsoft might be able to tell us of future plans to resolve the issue.
?
Apply Ron's "monitor and mitigate" alternatives means.
?
Require passwords with higher entropy? This only works if AD's technical weaknesses are riskier for shorter/less complex passwords. (I'm not nearly enough of a cryptographer to know.)
?
Weaken Silver by allowing something that 800-63 does not. This is suboptimal and may not pass FICAM (may not even pass the AAC, I suppose).
?
Temporarily weaken Silver by allowing something that 800-63 does not, for a limited period of time. This might work if Microsoft has a solution waiting in the wings and FICAM is being moderately generous.
?
4.2.3.4 - Stored Authentication Secrets (S). Use AD on top of Bitlocker or some other compliant full-disk encryption.
?
4.2.3.5 - Basic Protection of Authentication Secrets (B).
?
4.2.3.6 - Strong Protection of Authentication Secrets (S).
?
4.2.5.1 - Resist Replay Attack (B, S). Monitor and mitigate alternative means (assuming approval).
?
4.2.5.2 - Resist Eavesdropper Attack (B, S). Monitor and mitigate alternative means (assuming approval).
?
4.2.8.2.1 - Network Security (S). Monitor and mitigate alternative means (assuming approval).
|
- [AD-Assurance] Friday's call, David Walker, 04/17/2013
- RE: [AD-Assurance] Friday's call, Eric Goodman, 04/17/2013
- Re: [AD-Assurance] Friday's call, Ann West, 04/18/2013
- RE: [AD-Assurance] Friday's call, Curry, Warren, 04/18/2013
- Re: [AD-Assurance] Friday's call, David Walker, 04/18/2013
- RE: [AD-Assurance] Friday's call, Eric Goodman, 04/18/2013
- Re: [AD-Assurance] Friday's call, David Walker, 04/18/2013
- RE: [AD-Assurance] Friday's call, Curry, Warren, 04/18/2013
- Re: [AD-Assurance] Friday's call, Ann West, 04/18/2013
- RE: [AD-Assurance] Friday's call, Eric Goodman, 04/17/2013
Archive powered by MHonArc 2.6.16.